Back to Infrastructure
infrastructureL3 SystematicMCP & Tool Integration

RBAC per MCP tool

Role-Based Access Control per MCP tool means defining precisely which agents can call which tools, based on the agent's role, the task it's performing, and the data it's operating on.

  • ·Centralized MCP platform manages server provisioning, configuration, and lifecycle
  • ·Domain-specific MCP servers exist (Architecture MCP, Ownership MCP, SLA MCP)
  • ·RBAC controls which agents can access which MCP tools
  • ·MCP server health is monitored with alerting on downtime
  • ·New MCP servers go through a standardized review and onboarding process

Evidence

  • ·MCP platform configuration showing centralized server management
  • ·RBAC policy configuration for MCP tool access
  • ·MCP server inventory listing domain-specific servers with owners

What It Is

Role-Based Access Control per MCP tool means defining precisely which agents can call which tools, based on the agent's role, the task it's performing, and the data it's operating on. At basic authorization (L2), the boundary is coarse: read tools vs. write tools, with human approval for writes. RBAC per tool is fine-grained: a developer agent can read Jira tickets but not create them; a planning agent can create Jira tickets but not close them; a release agent can trigger deployments but only to staging, not production. Each tool has an access policy, and each agent role has a set of permitted tools.

The MCP specification supports authorization as a first-class concept. MCP servers can implement authorization checks that validate the requesting client's identity and permissions before executing a tool call. In a well-implemented RBAC system, the MCP server itself enforces access policies - not the calling agent (which could be compromised or confused) and not a wrapper layer that can be bypassed. Authorization is as close to the data as possible.

The practical implementation at L3 typically uses one of two patterns. The first is per-server RBAC: each MCP server has its own access control, and the platform configures which agents can connect to which server. A CI MCP server accessible only to the deploy agent; a production database MCP server accessible only to the monitoring agent. The second is per-tool RBAC within a server: a single MCP server exposes multiple tools with different access requirements, and each tool call checks the caller's identity against its specific policy. The second pattern is more complex but enables finer-grained control without server proliferation.

As organizations move toward larger agent fleets (dozens or hundreds of agents running different workflows), RBAC per tool becomes the primary mechanism for containing blast radius. An agent that is compromised, confused, or given an incorrect task can only damage what its permitted tools allow. RBAC is the safety belt that makes running many agents manageable.

Why It Matters

  • Contains blast radius for agent errors - an agent with RBAC-constrained tool access can only do as much damage as its permitted tools allow; without per-tool RBAC, one misbehaving agent can potentially call any tool, including destructive ones
  • Enables specialized agent roles - RBAC makes it possible to build purpose-specific agents (a deploy agent, a monitoring agent, a review agent) each with exactly the tool access their role requires, without granting broad access
  • Satisfies enterprise security requirements - most enterprise security and compliance frameworks require demonstrating that access to production systems is controlled and audited; per-tool RBAC is the minimum viable implementation of that requirement for AI agents
  • Creates the audit foundation - RBAC enforcement generates access logs that answer "which agent called which tool, when, and with what authorization"; these logs are required for compliance audits and essential for incident investigation
  • Scales to large agent fleets - manual approval-based authorization doesn't scale beyond a handful of agents; RBAC-enforced policies scale to hundreds of agents with no per-operation human involvement

Getting Started

6 steps to get from here to the next level

Common Pitfalls

Mistakes teams actually make at this stage - and how to avoid them

How Different Roles See It

B
BobHead of Engineering

Bob's security team has approved AI agent use in the development environment but is blocking agent access to staging and production systems until he can demonstrate a sound authorization model. They want to see evidence that agents can't accidentally (or maliciously) trigger production deployments or read production customer data.

What Bob should do - role-specific action plan

S
SarahProductivity Lead

Sarah is trying to enable agents to take more autonomous actions - creating tickets, updating documentation, triggering test runs - but every time she proposes expanding agent capabilities, the security review cycle takes weeks and often results in rejection. She needs a faster path from "we want agents to do X" to "agents are doing X safely."

What Sarah should do - role-specific action plan

V
VictorStaff Engineer - AI Champion

Victor is building specialized agent workflows for different stages of the development pipeline: a planning agent that works with tickets, a coding agent that works with the codebase, a review agent that analyzes PRs, and a deploy agent that triggers CI/CD. Each needs different tool access and he wants to ensure they can't exceed their intended scope.

What Victor should do - role-specific action plan